Abstract. Identifying and protecting the trusted computing base (TCB) of a system is an important task, which is typically performed by designing and enforcing a system security po...
We have developed an individual-based evolving predator-prey ecosystem simulation that integrates, for the first time, a complex individual behaviour model, an evolutionary mecha...
Artificial intelligence researchers interested in knowledge and in designing and implementing digitized artifacts for representing or sharing knowledge play a crucial role in the ...
In this paper, the decision making problems with the dependence and the feedback effects are considered. Although the analytic network/hierarchy process (ANP/AHP) has been propose...
This paper proposes a novel approach to the visualization of complex, but interrelated, sets of information to ease user cognition. Principally, it explores the potential of provi...